1 A school network has several computers. Each computer in the network has a media access control (MAC) address. Hexadecimal is used for MAC addresses. Part of a MAC address is given. 9D – 23 – E7 Each pair of digits is stored as binary in an 8-bit register. (a) Complete the binary register for the following digits.(b) Describe what is meant by a MAC address.

Answers

Answer 1

(a) To convert the hexadecimal digits to binary, we can use the following table:

Hexadecimal Binary

9 1001

D 1101

2 0010

3 0011

E 1110

7 0111

Therefore, the binary register for the given MAC address is:

1001 1101 0010 0011 1110 0111

(b) A MAC address is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. It is used to uniquely identify devices on a network, such as computers, routers, and switches, to ensure that data is sent to the correct destination. MAC addresses are typically represented as a string of six pairs of hexadecimal digits separated by colons or hyphens.

\(\huge{\colorbox{black}{\textcolor{lime}{\textsf{\textbf{I\:hope\:this\:helps\:!}}}}}\)

\(\begin{align}\colorbox{black}{\textcolor{white}{\underline{\underline{\sf{Please\: mark\: as\: brillinest !}}}}}\end{align}\)

\(\textcolor{blue}{\small\textit{If you have any further questions, feel free to ask!}}\)

\({\bigstar{\underline{\boxed{\sf{\textbf{\color{red}{Sumit\:Roy}}}}}}}\\\)


Related Questions

what is the mass of a cookbook

Answers

Answer:

it varies on the size of the cookbook

Explanation:

a math student is writing code to verify their project answers: sidelength ← 6 area ← (sqrt(3) / 4) * (sidelength * sidelength) that code relies on a built-in procedure sqrt() that calculates the square root of a number. after running the code, area stores 15.588457268119894. their classmates runs the same calculation on their own computer. their program results in an area of 15.58845726804. the two values are very close, but not quite the same. which of these is the most likely explanation for the difference?

Answers

The most likely explanation for the difference in the calculated values is The two computers represent the result of SQRT(3) with a different level of precision, due to their rounding strategy or size limitations.The correct answer is option E.

Computers typically represent real numbers using floating-point arithmetic, which has finite precision. The representation of irrational numbers, such as the square root of 3, involves rounding to a finite number of digits.

Different computers or programming languages may have different strategies for rounding, leading to slight variations in the computed result.

In this case, one computer computed the result as 15.588457268119894, while the other computer obtained 15.58845726804. The difference occurs in the digits beyond the 11th decimal place.

It is highly likely that these variations are a result of different rounding strategies or the representation limitations of floating-point numbers on each computer.

It is important to note that floating-point arithmetic is an approximation and can introduce small errors due to the finite precision of representation.

Therefore, when comparing results, it is often necessary to consider an acceptable tolerance or use alternative methods for precise calculations, such as using arbitrary-precision arithmetic libraries or symbolic computation systems.

For more such questions precision,Click on

https://brainly.com/question/31655548

#SPJ8

The probable question may be:

A math student is writing code to verify their project answers:

side Length ← 6

area ← (SQRT(3) / 4) * (sideLength * sideLength)

That code relies on a built-in procedure SQRT() that calculates the square root of a number. After running the code, area stores 15.588457268119894.

Their classmates runs the same calculation on their own computer. Their program results in an area of 15.58845726804.

The two values are very close, but not quite the same.

Which of these is the most likely explanation for the difference?

Choose 1 answer:

answer choices

A. One computer used an integer representation for the result of SQRT(3) while the other computer used the more accurate floating-point representation.

B. One of the computers has a bug in its mathematical operations.

C. One of the computers experienced an integer overflow error when calculating the result.

D. The two computers executed the arithmetic operations using a different order of operations.

E. The two computers represent the result of SQRT(3) with a different level of precision, due to their rounding strategy or size limitations.

You then explain that the most critical aspect of password security is _______ people use their passwords

Answers

The most critical aspect of password security is how people use their passwords.

To maintain a high level of password security, it's essential to follow these guidelines:
1. Create strong passwords: Use a combination of upper and lowercase letters, numbers, and special characters to make it difficult for attackers to guess or crack the password through brute-force methods.
2. Use unique passwords for each account: Avoid using the same password across multiple platforms, as a breach in one account can lead to compromised access to other accounts.
3. Update passwords regularly: Change your passwords periodically to minimize the risk of unauthorized access due to stolen or guessed passwords.
4. Do not share passwords: Sharing your password with others, even with close friends or family, increases the chances of unauthorized access and compromises security.
5. Enable multi-factor authentication (MFA): MFA adds an extra layer of protection by requiring additional verification, such as a fingerprint, security token, or one-time code, along with the password for accessing an account.
6. Avoid storing passwords insecurely: Writing passwords down or saving them in unprotected files can expose them to potential attackers.
7. Be cautious with password recovery options: Use secure email addresses and alternative recovery methods to ensure that only you can regain access to your account if you forget your password.
By adhering to these best practices, you can significantly improve the security of your passwords and protect your personal information from potential cyber threats.

For more questions on password

https://brainly.com/question/28114889

#SPJ11

Assume that sum is called with a parameter that satisfies the precondition and that it executes without error. How many times is the test expression i < bound in the for loop header evaluated

Answers

The number of times which the test expression i < bound in the for loop header can be evaluated assuming that a sum is called with a parameter that satisfies the precondition and that it executes without error is:

As many times as needed until the condition is met but which must be at least 1 time.

What is a Loop?

This refers to the repetition of an iteration until a preset condition is met and then it stops.

Hence, when a sum is called with a parameter in a line of code and a for loop is used with the test expression i< so that a certain condition can be met, then there would be multiple iterations until that condition is met, until it stops, which is the code execution without an error.

Read more about for loops here:

https://brainly.com/question/19344465

What does music mean to you? Is it a big part of your life, or is it just "there". Answer in at least two complete sentences.

Answers

Answer:

Music means a lot to almost everyone and plays a significant role in most people's lives. With all of the different genres, music encompasses a wide range of moods and emotions, and there is something for almost everyone.

Answer:

Music plays a crucial role in several people's lives. There is proof that music has helped benefit people's lives to be more positive, and some studies show that students that listened to music and meditated with music during school, had anxiety levels less than students who didn't get such an opportunity.

Explanation:

(I've read a paper somewhere for school for a health project abt stress and anxiety)

Did taking the survey make you more aware of the skills you need in life besides academic knowledge? What skills do you think people your age group need to develop the most

Answers

Answer: Yes it did because I learned a new skill that will help me in the future. I dont know what your age is but here. People my age should learn how to be more resposiable.

Explanation:

How does this skill honed and improved by internet technology?

Answers

Internet technology can hone and improve this skill by providing access to an abundance of resources, such as articles, tutorials, and videos.

People now have access to a wealth of knowledge on a wide range of subjects thanks to the internet.

The creation of tools and apps for language learning on the internet has also made it simpler for people to learn new languages.

Online communities have been developed thanks to the internet, allowing people to communicate with those who speak different languages. These communities give people the chance to practise writing and speaking in another language.

People can now more easily take part in language exchange programmes thanks to the internet.
Additionally, with the ability to connect to others through online communities, one can receive feedback and constructive criticism, allowing for a faster and more targeted improvement in the skill.

For such more question on technology:

https://brainly.com/question/4903788

#SPJ11

why would a Linux administrator use shell commands rather than a Linux GUI when creating users at once

Answers

A Linux administrator may choose to use shell commands instead of a Linux GUI when creating users at once for several reasons.


Firstly, shell commands offer greater flexibility and efficiency. With shell commands, administrators can quickly perform repetitive tasks, such as creating multiple users, by using loops or scripting. This can save significant time and effort compared to manually creating each user through a GUI interface.

Secondly, shell commands provide more control and customization options. Administrators can specify various parameters, such as user permissions, groups, home directories, and passwords, in a single command. This allows for consistent user creation across multiple systems and ensures adherence to security policies.

Furthermore, using shell commands allows administrators to automate user creation processes. By incorporating shell commands into scripts or configuration files, administrators can easily replicate user creation on different systems or automate the process to run at specific intervals. This enhances system management and reduces the chances of human error.

Another advantage of using shell commands is their ability to be executed remotely. Administrators can connect to a Linux server through SSH (Secure Shell) and create users using shell commands from their local machine. This is particularly useful when managing multiple servers or systems remotely, eliminating the need for physical access or graphical interfaces.

Overall, the use of shell commands by Linux administrators for creating users at once offers flexibility, efficiency, control, automation, and remote management capabilities. It allows administrators to streamline their tasks, ensure consistency, and simplify user management across systems.

To learn more about Linux :

https://brainly.com/question/33210963

#SPJ11

identify the types and features of common network services.

Answers

Network services are services that are enabled over a network, usually the Internet, to provide users with access to resources, applications, and other services.

What is Network?

A network is a set of interconnected computers and other electronic devices that share a common communication protocol and are able to exchange data or resources.

Common network services include email, file transfer, web hosting, streaming media, online games, and voice over IP (VoIP).

Email: Email is one of the most commonly used network services. It allows users to send and receive messages, attachments, and other files over the Internet.

File Transfer: File transfer services allow users to transfer files from one computer to another over the Internet. Common file transfer protocols include FTP, SFTP, and SCP.

Web Hosting: Web hosting services provide users with access to a web server and the necessary software and tools to host a website.

Streaming Media: Streaming media services provide users with access to audio and video content over the Internet. Examples include streaming audio, streaming video, and streaming radio.

To learn more about Network

https://brainly.com/question/28521920

#SPJ4

What happens if a file is opened for output and the file already exists?If a file already exists what happens to it if you try to open it as an output file (using the ' w ' mode )? If a file with the specified name already exists when the file is opened, the contents of the existing file will be erased.

Answers

When you try to open a file for output using the 'w' mode, the system checks if a file with the specified name already exists in the directory. If it does, the system will delete the existing file and create a new one with the same name.

This means that if you try to open a file for output and the file already exists, all the data stored in the existing file will be erased. The new file will be empty, and any data that was previously stored in the old file will be lost.

It is important to be careful when using the 'w' mode to open files for output, especially if you are working with important data that you do not want to lose. To avoid accidentally overwriting important files, you can use the 'a' mode instead, which will append data to the end of the file if it already exists, rather than erasing it.

To know more about output  visit:-

https://brainly.com/question/18591190

#SPJ11

A pcr-based method to detect a specific pathogen in a specimen works by amplifying a ________ that is specific to the prospected agent.

Answers

A PCR-based method that is used to detect a specific pathogen in a specimen works by amplifying a gene that is specific to the prospected agent.

What is a gene?

A gene can be defined as a component of deoxyribonucleic acid (DNA) that produces or forms a single (one) protein product.

This ultimately implies that, a gene refers to the complete set of hereditary instructions which is mainly found in the deoxyribonucleic acid (DNA) of an organism, and it produces or forms a single (one) protein product.

What is a pathogen?

A pathogen can be defined as living microorganisms that are capable of causing harm and diseases to their host and some examples of pathogens include the following:

WormsVirusProtozoaFungiBacteria

In conclusion, we can infer and logically deduce that a PCR-based method that is used to detect a specific pathogen in a specimen (organism) works by amplifying a gene that is specific to the prospected agent because it comprises a complete set of hereditary instructions.

Read more on genes here: brainly.com/question/3452155

#SPJ4

My iPhone has suddenly started saying "No SIM Card Installed", this is after 2 years of no problems, what is going on and how do I fix it?

Answers

It appears as though the SIM card in your iPhone has been damaged or lost. Try powering off your iPhone, taking out the SIM card, and then putting it back in.

SIM: What is it?

A small smart card called a SIM (Subscriber Identity Module) is used in mobile phones and other devices to verify and identify subscribers on a network. It is an integrated circuit that stores information about the network, like the phone number of the user and data about network authorization. By simply removing the SIM card from one device and inserting it into another, users are able to switch phones. It also makes it possible for users to take advantage of features like call forwarding and roaming services.

Learn more about iPhone:

brainly.com/question/29380381

#SPJ4

you are an it technician responsible for defining and implementing it solutions throughout the organization. you have discovered that users in a remote branch office have configured a wi-fi network for use only in their location without approval from headquarters. which term best describes this scenario?

Answers

Adding a Wi-Fi connection to a networks without permission is an example of "shadow IT," which is used to describe non-IT workers who install or operate networked devices.

Can Wi-Fi be used offline?

One point to keep in mind is that WiFi does not automatically establish internet access, therefore you won't be capable of connecting if your WiFi is not connected to any internet services. You should exercise caution and only join Wifi that you trust if you can access to them.

How can I get Wi-Fi on my phone?

Activate Wi-Fi. A Wi-Fi network will be automatically searched for by your device. By tapping a Wi-Fi network's name, you can connect to it. You might need to provide the network password or accept the terms and conditions before you can join.

To know more about wi-fi network visit:

https://brainly.com/question/13267388

#SPJ4

suzanne’s at 2 inches per week suzanne’s at 1.5 inches per week megan’s at 3 inches per week megan’s at 2.5 inches per week

Answers

Based on the above, the plant that grew at a faster rate would be Megan’s at 2.5 inches per week.

What is the growth rate about?

The term growth rates is known to be one that is often used to show the annual alterations in a variable.

Note that:

Megan's rate = 12 - 4.5 / 4 -1

= 2.5 inches per week

Suzanne's rate = 11 - 5 / 4-1

= 0.5 inches per week

Based on the above,, the plant that grew at a faster rate would be Megan’s at 2.5 inches per week.

Learn more about growth rate from

https://brainly.com/question/2480938

#SPJ1

Megan and Suzanne each have a plant. They track the growth of their plants for four weeks. Whose plant grew at a faster rate, and what was the rate? Suzanne’s at 2 inches per week Suzanne’s at 1.5 inches per week Megan’s at 3 inches per week Megan’s at 2.5 inches per week

INPUTS: Create a circuit in Logisim that will take the following inputs: A:4 bit binary number B:4 bit binary number : Control where: if C 0, A and B wil be treated a$ unsigned binary if C 1 , A and B wil be treated as 2's complement signed binary for example, the number 101 represents the value "5' if it is treated as unsigned binary but it represents the value if it is treated as 2's complement.) OUTPUTS: The circuit will compare the two numbers and send put a "1 to the corresponding output: s: if A is less than B s: if A is equal to B >: if A is greater than B Your circuit will look something like this: 4 Bit Controlled Comparator 1. The circuit is to be implemented using sub-circuits as discussed in class. 2. HINT: Your final circuit should contain an UNSIGNED COMPARATOR. You will then need to make modifications to the outputs of the UNSIGNED COMPARATOR to make it work with signed numbers. 3. You may only use the basic gates: NOT, AND, OR, XOR. You may use these gates to build larger sub-circuits of your own: ADDER, MULTIPLEXER, etc. and incorporate these nto your main circuit 4. You are not alowed to use Logisim's built-in circuits: ADDER, MULTIPLEXER, etc, but you are free to build your own using the basic gates This is NOT a team project. Each student is expected to do his/her own work S.

Answers

To create a circuit in Logisim that takes in two 4-bit binary numbers A and B, along with a control input C, the sub-circuits and basic gates will be used to build an UNSIGNED COMPARATOR. Then modify the outputs of the UNSIGNED COMPARATOR can be modified to work with signed numbers.

First, create sub-circuits for the basic gates NOT, AND, OR, and XOR. Then use these gates to build larger sub-circuits like the ADDER and MULTIPLEXER. Then incorporate these sub-circuits into the main circuit.
To implement the comparison function, use the UNSIGNED COMPARATOR to compare the absolute values of A and B. Afterwards use the sign bit of A and B to determine whether A is positive or negative. If A is positive, output a 1 to the corresponding output if A is less than B, and a 0 otherwise. If A is negative, output a 1 to the corresponding output if A is greater than B, and a 0 otherwise.

Learn more about Circuits: https://brainly.com/question/16662101

#SPJ11

a search engine is aprogram to search......

Answers

Yes it is. Why are you asking?

In HTML, an opening tag and its closing tag must appear on the same line. True Or False​

Answers

Answer:

the answer is true, you cannot break the element apart EVERR!!!!!

Big data are _____. Select 2 options. (please help!)

a. extremely big sets of information
b. used to address privacy concerns
c. protected from corruption and theft
d. a trustworthy source of information
e. collected through automated processes

Answers

Big data are:

Extremely big sets of information.Collected through automated processes.

What is Big data?

The definition of big data is known to be when data is said to have high variety, seen in high volumes and also a lot of velocity.

Note that they are larger, very complex sets of data and are from new data sources and as such Big data are:

Extremely big sets of information.Collected through automated processes.

Learn more about data from

https://brainly.com/question/19049345

#SPJ1

collected through automated process

extremely big sets of information

Edg 2022

Big data are _____. Select 2 options. (please help!)a. extremely big sets of informationb. used to address

A. Fill in the blanks:
1.
is an effective way to display data in pictorial form.
2. Data series are the bars or slices that show the
3. Barchart displays data in the form of long
rods.
4.
is the vertical axis that is used to plot the values.
5.
is a key that is used to identify the colours, patterns, or symbol assigned to a data series.

Answers

Answer:

1. Charts.

2. Data series.

3. Rectangular.

4. Y-axis.

5. Legend.

Explanation:

1. Charts: is an effective way to display data in pictorial form. It includes the use of pie charts, bar charts, venn diagram, etc.

2. Data series: are the bars or slices that show the data values. It comprises of related data sets.

3. Barchart displays data in the form of long rectangular rods. Generally, bar charts are used for the comparison of informations obtained from a data collection by representing each value (information) with rectangular bars respectively. A bar chart has a x-axis and a y-axis used to represent the various categories of data collected.

4. Y-axis: is the vertical axis that is used to plot the values. The other axis for plotting values is known as X-axis.

5. Legend: is a key that is used to identify the colours, patterns, or symbol assigned to a data series.

What is the main difference between cell phone and mobile phone?

Answers

Answer:

A Cell Phone is, therefore, a mobile phone that works utilizing radio cells, which is an area of radio coverage. Cell phones can typically be used while moving from one cell to another without losing coverage or dropping the connection. Satellite phones are not cell phones, although they are mobile phones.

Explanation:

Cell phones are less sophisticated than mobile phones because they are older and more primitive.

explain the following types of storages


flash disk ​

Answers

Explanation:

a data storage device that uses flash memory specifically : a small rectangular device that is designed to be plugged directly into a USB port on a computer and is often used for transferring files from one computer to another. — called also thumb drive.

Answer:

storage module made of flash memory chips. Flash disks have no mechanical platters or access arms, but the term "disk" is used because the data are accessed as if they were on a hard drive. The disk storage structure is emulated.

The first flash disks were housed in Type II PC Cards for expanding laptop storage. Subsequently, flash memory disks have arrived in a variety of formats, including entire hard drive replacements (see SSD), memory cards for digital cameras (see flash memory) and modules that fit on a keychain (see USB drive

QUESTION
Which weld type is shaped like a right triangle and is commonly used to make lap joints,
corner joints, and T-joints?
POSSIBLE ANSWERS:
O Slot weld
O Fillet weld
O Plug weld
O Groove weld

Answers

Answer:

The weld that is shaped like a right triangle and is commonly used to make lap joints corner joints, and T-joints is;

Fillet weld

Explanation:

Fillet welds are defined as welds that have a cross section that is approximately triangular in shape that is used for joining two surfaces that form a perpendicular of near perpendicular alignment to each other in joint configurations including a lap joint, T-joint, and corner joint, such that the cross section of the weld is approximately the same as a right triangle.

Implement maketree, setleft, and setright for right in-threaded binary trees using the sequential array representation.

Answers

Maketree, setleft, and setright functions can be implemented for right in-threaded binary trees using the sequential array representation. These functions allow the creation of the tree structure and setting the left and right pointers of the nodes efficiently.

In a right in-threaded binary tree, each node maintains a right-threaded pointer, which points to the next node in the inorder traversal if the right child is null. To implement maketree, we allocate a new node in the array and set its left and right pointers to null. For setleft and setright, we update the left and right pointers of a given node by assigning the indices of the desired child nodes in the array.

To set the left pointer, we simply assign the index of the left child node to the left pointer of the given node. To set the right pointer, we first check if the given node has a right child. If it does, we assign the index of the right child to the right pointer. If it doesn't, we update the right pointer to the index of the next node in the inorder traversal. By utilizing these functions, we can construct and manipulate right in-threaded binary trees efficiently using a sequential array representation.

Learn more about sequential array here: brainly.com/question/32296744

#SPJ11

What two factors make up the skills of a good typist

Answers

Answer:

I feel to be a good typist one would have to have a good grasp of reading, grammar, and the ability to make errors to a lesser degree than more so. I can type, myself, 120-150 wpm with an error rate of 0-2. I also have the ability of not having to look at the keyboard as I type, and have a good eye on catching errors.

Explanation:

What is the missing line of code?
class shoe:


self.style = style
self.color = color

def __str__(self):
return self.style + ' ' + self.color

Answers

Answer:

def_init_(self, style, color):

explanation:

i just took the test on edg 2020

The missing line of code is def_init_(self, style, color).

What is code?

Code is defined as the instructions written in a programming language that a compiler transforms into computer code. Although a code technically lacks a defined meaning, doctors frequently use it to refer to a cardiopulmonary arrest that occurs to a patient in a hospital or clinic and necessitates the prompt arrival of a team of medical professionals and the start of resuscitative measures.

The code is complete and in perfect working order. The Person class is properly extended from the Employee class. As a result, Person is the parent class of Employee and Employee is a subclass of Person. The only issue with this code is its flawed structure, which includes missing whitespace and indexing, two essential Python features.

Thus, the missing line of code is def_init_(self, style, color).

To learn more about code, refer to the link below:

https://brainly.com/question/497311

#SPJ5

Role playing games have an objective of trying to gain the most points in a certain period of time.
Group of answer choices

True

False

Answers

Answer: I think False.

You have a web server that will be used for secure transactions for customers who ____

Answers

You have a web server that will be used for secure transactions for customers who:-

a. need to transmit sensitive information.

b. want to ensure the confidentiality of their data.

c. require secure authentication and encryption.

A web server used for secure transactions caters to customers who need to transmit sensitive information, want to ensure the confidentiality of their data, and require secure authentication and encryption. This type of server employs various security measures such as SSL/TLS protocols, HTTPS, digital certificates, and encryption algorithms to protect the integrity and privacy of customer transactions. By implementing these security measures, the web server ensures that customer data remains secure during transmission and minimizes the risk of unauthorized access or data breaches.

To know more about  encryption algorithms, visit:

https://brainly.com/question/21804639

#SPJ11

Which of the following would be the best variable name to store the value of your English letter grade? Python coding
letter_Grade
g
1grade
LG

Answers

Answer:

The answer is "letter_Grade".

Explanation:

In the given question, the first choice "letter_Grade" is correct because it is a descriptive variable, which is used for holding the string value, and the wrong choice can be defined as follows:

In the second and third choice, it is wrong because it is not descriptive.In the fourth choice, it is wrong because it uses a number that is not allowed.

How do you perceive the importance of Internet?

Answers

The Internet had been used since the 1960's. The internet has capability of giving any answer you need or just having fun. If you want more, wikipedia the internet.

Answer:

In the grand scheme of things, the internet is now essential and an everyday part of our lives. It's hard to imagine how much everything would be affected if the internet suddenly vanished one day. People have their livelihoods based around the internet. We're more connected because the internet allows for people across the world to communicate. Of course there is bad as a direct result, but there's also good. So, in short, the internet is the backbone of many facets of our developing society.

Explanation:

Damage to data or equipment that in which the data or equipment can not be recovered is which concern

Answers

Damage to data or equipment in which the data or equipment can not be recovered in the concern associated with data loss.

What happens when data is lost or damaged?

The notoriety of a business may definitely suffer due to data loss or damage. It involves a complete process of communicating a data loss incident to customers, but it can unintentionally outcome in a lack of trust and discontent.

According to the context of this question, the mechanism of data loss takes place when data is completely or partially destroyed, corrupted, or made unreadable by software applications and users. It is thought that the process of data loss accidentally or unintentionally happens.

Therefore, damage to data or equipment in which the data or equipment can not be recovered is the concern associated with data loss.

To learn more about Data loss, refer to the link:

https://brainly.com/question/15027705

#SPJ9

Your question seems incomplete. The most probable complete question is as follows:

Damage to data or equipment that in which the data or equipment can not be recovered is which concern?

a concern associated with data loss. a concern associated with data recovery.a concern associated with data indentation.
Other Questions
Suppose that a gasoline tank is an upright cylinder with a radius of 23m and a depth of 4m is placed so the top is 2m underground. Gasoline has a density of approximately 750 kg/m3. Find the work done in emptying the tank out a spout 1m above ground. ______________is an important strategy to communicate with families to enable them to fully understand illness and treatment plans. Tammy calls her grandmother every Saturday night. There are two phone companies she can use: Telcom charges $0. 12 per minute and United Phone charges a flat fee of $0. 78 plus $0. 09 for every minute thereafter. How many minutes can Tammy talk to her grandmother and be charged the same amount by either phone company?Tammy can talk how many minutes? The area of a circle is pi square inches. What is the diameter? In this conditional statement, what would be the predicate results for variable a to be a double primitive type? if ((a = (2 + 1) / 2) ANSWER ALL QUESTIONS AND SHOW WORK FOR A THUMBS UP PLEASEPlanet Fitness, Inc. is a franchisor and operator of fitness centers in 50 states, the District of Columbia, Puerto Rico, Canada, the Dominican Republic, Panama and Mexico. The company is well-known for its $10 basic membership fee, although customers can also sign up for a more expensive $22.99 PF Black Card membership that comes with additional perks, including additional in-store amenities such as hydro-massage beds and affinity partnerships for discounts and promotions.According to the companys Securities and Exchange Commission 10K filings, as of December 30, 2020, Planet Fitness had 13.5 million members. The company reports that about 60% of its customers are PF Black Card members and the remaining 40% hold basic membership. Data analytics website Second Measure estimates that Plant Fitnesss customer retention rate is about 68%.Assume that Planet Fitness incurs a variable cost of $3.50 per customer with basic membership and $6.80 per PF Black Card customer. Planet Fitnesss average weighted cost of capital (i.e. its discount rate) is estimated to be around 6%, according to Guru Focus.a) What is the customer lifetime value (CLV) of each customer with a PF Black Card membership? (3 points)b) What is the CLV of each customer with a basic membership? (3 points)c) What was the CLV of the companys total customer portfolio as at December 30, 2020? (4 points)d) What would be the CLV of a customer with basic membership if the monthly retention rate were 60 percent? (2 points)e) What would be the CLV of a customer with basic membership if the monthly retention rate were 90 percent? (2 points)f) Taken together what do the results in (b), (d), and (e) tell you about the impact of customer retention on customer lifetime value? (1 point) another name for custom development might be what? offshore outsourcing in-house development vendor supplied in-house consulting case tools package software Where did Anne Frank and her family go when they left Germany? Blood type is determined by the blank on the blood cells A shipping carrier charges $5 per pound, plus a $3 signature fee. What is the total cost of shipping various packages? A cup contains 438 grams of sand. A bucket contains 2,120 grams of sand. How many more grams of sand are in the bucket than the cup? On Jan 1, ABC issues a bond with a face value of 1,000, 6% coupon, 3 year term, payble semi-annually each July 1 and Jan 1. The market requires a 4% return. What is the net book value of the bond reported on the balance sheet at the end of the first year A committee is formed consisting of one representative from each of the 4 departments (CS-IS-IT-SW) in the computer science college, where the representative from a department is either the president or one of the two representatives from that department. How many ways are there to form this committee? Students in Mr. Garcia's class were having a race! No, not running. Instead they rolled tennis balls down a wooden track. The tennis balls have the same mass and diameter. Using the data table, decide which ball had the MOST kinetic energy. How can we solve social discrimination?. put the following events in order 1,keistallnacht2,Hitler comes to power 3,Jewish persons Ghettos 4,anti- semitic laws passed 5,The final solution. What do you need to add to -6 to get 10? i need helppp When Kant talks about humanity, to whom is he referring? 1. All and only those who are members of the species Homo sapiens. 2. All sentient animals. O 3. All and only those beings that possess autonomy and rationality. 4. All primates, including Homo sapiens. Which of the following is within the original jurisdiction of the Supreme Court?a. federal criminal mattersb. tax disputesc. military tribunalsd. cases involving the state governments 15. What is the solution to the following system of equations?(3,3)(-2,0)(6,2)(2,6)